共 8 条
- [1] Anderson J.P., 1972, Computer security technology planning study, V2
- [2] [Anonymous], 2013, PROC HASP ISCA
- [3] [Anonymous], 2013, 2 ACM INT WORKSHOP H
- [5] Hoekstra M., 2013, P 2 INT WORKSH HARDW, P1
- [6] AUTHENTICATION IN DISTRIBUTED SYSTEMS - THEORY AND PRACTICE [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1992, 10 (04): : 265 - 310
- [7] Rushby JohnM., 1981, Design and verification of secure systems, V15
- [8] Standard DoD, 1985, 520028 DOD